Sky Dragon Rider
Chapter 1242 – Goats in the mouth of tigers
The two secret service fighters would never have imagined that in this cafe, in such a short period of time, the girl under the surveillance of the two of them would have reached an unimaginable relationship with the digital intelligent construct that was making noise outside the atmosphere. partnership.
Although it was helping Marcia and Maureen who was in another world, it was not without gains for Cybertrom.
"I need the data from your laptop, all of it!"
Cybertrom sent a request. It obviously took a fancy to the contents of the laptop. Due to the previous promise, it could only scan it briefly and did not read in depth.
"What do you want these things for?"
Marcia Wright was very surprised. Cybertrom was able to gradually grow to the size it is today in the asteroid belt, so she shouldn't look down on those things in her laptop.
There are only some technical documents, experimental records and source code packages accumulated so far in the solid-state memory.
"I need to complete the database! This is very important."
Incomplete databases are always a huge hidden danger for logical digital intelligence. Since the implementation of priority tasks has not officially started, these hidden dangers have no chance to erupt for the time being, but sooner or later they will pose a fatal threat to Cybertrom.
who I am?Where do I come from?Where am I going?The meaning of my existence? ... A series of philosophical questions about the meaning of life, even human beings can't bear it.
Humans will become neurotic, digital intelligence will collapse, eh.Infinite loop.
Designed as a weapon of war, the "Adam" activated in a complete state does not have this hidden danger.
"Okay! I can promise you! But the amount of data is huge, I will assemble a server dedicated to compression, encryption and relay forwarding, and you can read it yourself."
Think for a moment.Marcia immediately agreed to the request.
The technical data and experimental records in the laptop belong to a special niche field, there are not many taboo technologies, at most black technology.
Even though there are sensitive materials related to the Longinus spear, there is no Longinus spear.These data are useless. Human countries have a very high level of supervision over the 108 Longinus sub-guns. It is by no means an easy task for the Third Era civilization to recapture them, let alone the Cybertrom whose body is outside the atmosphere. .
"Speak out!"
"It's hard to chase a horse!"
After gulping down the lukewarm coffee, Marcia Wright closed the laptop, threw a big red ticket on the table, picked up her schoolbag, got up and left.
The two secret service fighters followed suit and dropped the money.chased after.
The waiter in the cafe was at a loss for a while, the money on the table was more than enough to pay the bill, but it was fine for one customer to leave in a hurry, but he did not expect two other customers to throw away the money and leave. Is it because the coffee at home is bad?Or has tipping suddenly become popular?
Standing at the intersection, Marcia said without looking back: "Go back to the base!"
The sound is not loud though.But it was enough for the two secret service soldiers to hear clearly.
"Oh! Good, good!"
The male soldier in a Chinese tunic suit and his comrades looked at each other. Marcia suddenly left the base for no reason, and now she is going back, which is really confusing.
The two hurriedly arranged vehicles and routes, and brought the girl who let herself out to the base of the "Dark Night" Special Service Brigade.
For Marcia, building a data relay server that does not require high performance is easier than eating and drinking. Install an operating system similar to a "scapegoat" and a few specific requirements on a ready-made host. Software will do.
Cybertrom invades the satellite, enters the Internet of the human world, and follows the "scapegoat" server for a specific period of time to connect to the data relay server placed in the underground base of the "Dark Night" Special Service Brigade.Go to Marcia's personal laptop.A high-security communication link similar to a VPN will not reveal the location of the underground base.
The network environment of the underground base is not comparable to that of a civilian network. The upload speed suddenly soared, the load of the data relay server quickly reached 70%, and the data in the solid state storage of the laptop was continuously transmitted into the Cybertrom itself.
Because of the relationship of one homology. Cybertrom's data verification program quickly fills up the riddled database, and the original logical hidden dangers are rapidly disappearing at a speed visible to the naked eye.The day the database is fully patched, there will be no more danger of a smart crash.
"Alchemy? Is it the magic civilization of the firmament world?"
If other people saw some strange information in the laptop, they would probably not take it seriously, but Cybertrom, who had established a trust relationship with Marcia, took it seriously.
"Did you see it? That is indeed the rune and magic circle information transmitted from the sky world, but the rules of our world are somewhat different. If you want to activate them, you need special verification and improvement, otherwise it will be difficult to stimulate the effect. I've been doing this a lot lately."
Marcia felt that typing was a waste of time, so she directly activated the voice mode.
"I can provide assistance with this, including simulation calculations."
Cybertrom offered to help Marcia unravel the mystery of alchemy. Its voice did not fluctuate at all, most likely because it called the voice library, and it could not tell the gender.
"Ah?! Is it possible? How much can you calculate?"
Marcia, who returned to the laboratory table, raised her head and looked at the laptop on the desk not far away.
"The sum of all supercomputers on Earth, multiplied by a hundred thousand times!"
Cybertrom had an understatement with a startling reply.
"Is it true? How much can you offer me?"
This reply was a surprise. She was worried that she had nowhere to find computing resources, and the sleepy person happened to meet the pillow.
It is really hard to find a place to break through the iron shoes, and it takes no effort to get it.
It is already the limit for the military to be able to extract seven supercomputers. By using the bot servers on the Internet to form a large-scale distributed calculation, they can barely scrape together a supercomputer, plus this laptop with excellent performance in her hand, all added together , which is equivalent to eight and a half supercomputers working together to analyze the magic circle and runes of alchemy.
But from the perspective of real efficiency, there are actually only three supercomputers operating at full capacity 7×24 hours. After all, the military’s seven supercomputers only provide computing resources in their spare time. It is impossible to pay for electricity bills, labor and various consumption Give it to others for nothing.
Commonly known as the sound of a cannon, ten thousand taels of gold, in fact the burning efficiency of a cannon is not as efficient as the introduction fee of a supercomputer. They count by the second, which vividly interprets "time is money".
"99%, I have a lot of redundancy, if not enough, I can continue to expand."
Since the moment it was accidentally activated in the asteroid belt, Cybertrom has been trying its best to expand its honeycomb system. Each honeycomb structure is equivalent to the most advanced supercomputer in Earth civilization, but most of the time, these computing resources are in the dormant state.
Compared with "Adam" who was happy to get a small piece of "Fenrir" alloy, Cybertrom is obviously much happier. It has a complete satellite, and the content of Split metal and coin gold in it far exceeds "Fenrir", also because of the ownerless dragon soul, Cybertrom has the innate ability to devour metal and construct evolution of the gold dragon family.
Compared with the ongoing digital evolution of the golden dragon family, if Cybertrom evolves into a giant dragon, it will be a pure and complete real digital dragon.
"Of course! I want it all!"
Marcia cheered, her voice echoing throughout the room.
"Analyze the runes, analyze the magic array, deduce the 'halo', all belong to you!"
The seemingly innocent Cybertrom sent himself to the tiger's mouth for nothing, and became the other party's bodyguard. All the hard work, tiring work, and dirty work fell on him.
-
-(to be continued~^~)
Although it was helping Marcia and Maureen who was in another world, it was not without gains for Cybertrom.
"I need the data from your laptop, all of it!"
Cybertrom sent a request. It obviously took a fancy to the contents of the laptop. Due to the previous promise, it could only scan it briefly and did not read in depth.
"What do you want these things for?"
Marcia Wright was very surprised. Cybertrom was able to gradually grow to the size it is today in the asteroid belt, so she shouldn't look down on those things in her laptop.
There are only some technical documents, experimental records and source code packages accumulated so far in the solid-state memory.
"I need to complete the database! This is very important."
Incomplete databases are always a huge hidden danger for logical digital intelligence. Since the implementation of priority tasks has not officially started, these hidden dangers have no chance to erupt for the time being, but sooner or later they will pose a fatal threat to Cybertrom.
who I am?Where do I come from?Where am I going?The meaning of my existence? ... A series of philosophical questions about the meaning of life, even human beings can't bear it.
Humans will become neurotic, digital intelligence will collapse, eh.Infinite loop.
Designed as a weapon of war, the "Adam" activated in a complete state does not have this hidden danger.
"Okay! I can promise you! But the amount of data is huge, I will assemble a server dedicated to compression, encryption and relay forwarding, and you can read it yourself."
Think for a moment.Marcia immediately agreed to the request.
The technical data and experimental records in the laptop belong to a special niche field, there are not many taboo technologies, at most black technology.
Even though there are sensitive materials related to the Longinus spear, there is no Longinus spear.These data are useless. Human countries have a very high level of supervision over the 108 Longinus sub-guns. It is by no means an easy task for the Third Era civilization to recapture them, let alone the Cybertrom whose body is outside the atmosphere. .
"Speak out!"
"It's hard to chase a horse!"
After gulping down the lukewarm coffee, Marcia Wright closed the laptop, threw a big red ticket on the table, picked up her schoolbag, got up and left.
The two secret service fighters followed suit and dropped the money.chased after.
The waiter in the cafe was at a loss for a while, the money on the table was more than enough to pay the bill, but it was fine for one customer to leave in a hurry, but he did not expect two other customers to throw away the money and leave. Is it because the coffee at home is bad?Or has tipping suddenly become popular?
Standing at the intersection, Marcia said without looking back: "Go back to the base!"
The sound is not loud though.But it was enough for the two secret service soldiers to hear clearly.
"Oh! Good, good!"
The male soldier in a Chinese tunic suit and his comrades looked at each other. Marcia suddenly left the base for no reason, and now she is going back, which is really confusing.
The two hurriedly arranged vehicles and routes, and brought the girl who let herself out to the base of the "Dark Night" Special Service Brigade.
For Marcia, building a data relay server that does not require high performance is easier than eating and drinking. Install an operating system similar to a "scapegoat" and a few specific requirements on a ready-made host. Software will do.
Cybertrom invades the satellite, enters the Internet of the human world, and follows the "scapegoat" server for a specific period of time to connect to the data relay server placed in the underground base of the "Dark Night" Special Service Brigade.Go to Marcia's personal laptop.A high-security communication link similar to a VPN will not reveal the location of the underground base.
The network environment of the underground base is not comparable to that of a civilian network. The upload speed suddenly soared, the load of the data relay server quickly reached 70%, and the data in the solid state storage of the laptop was continuously transmitted into the Cybertrom itself.
Because of the relationship of one homology. Cybertrom's data verification program quickly fills up the riddled database, and the original logical hidden dangers are rapidly disappearing at a speed visible to the naked eye.The day the database is fully patched, there will be no more danger of a smart crash.
"Alchemy? Is it the magic civilization of the firmament world?"
If other people saw some strange information in the laptop, they would probably not take it seriously, but Cybertrom, who had established a trust relationship with Marcia, took it seriously.
"Did you see it? That is indeed the rune and magic circle information transmitted from the sky world, but the rules of our world are somewhat different. If you want to activate them, you need special verification and improvement, otherwise it will be difficult to stimulate the effect. I've been doing this a lot lately."
Marcia felt that typing was a waste of time, so she directly activated the voice mode.
"I can provide assistance with this, including simulation calculations."
Cybertrom offered to help Marcia unravel the mystery of alchemy. Its voice did not fluctuate at all, most likely because it called the voice library, and it could not tell the gender.
"Ah?! Is it possible? How much can you calculate?"
Marcia, who returned to the laboratory table, raised her head and looked at the laptop on the desk not far away.
"The sum of all supercomputers on Earth, multiplied by a hundred thousand times!"
Cybertrom had an understatement with a startling reply.
"Is it true? How much can you offer me?"
This reply was a surprise. She was worried that she had nowhere to find computing resources, and the sleepy person happened to meet the pillow.
It is really hard to find a place to break through the iron shoes, and it takes no effort to get it.
It is already the limit for the military to be able to extract seven supercomputers. By using the bot servers on the Internet to form a large-scale distributed calculation, they can barely scrape together a supercomputer, plus this laptop with excellent performance in her hand, all added together , which is equivalent to eight and a half supercomputers working together to analyze the magic circle and runes of alchemy.
But from the perspective of real efficiency, there are actually only three supercomputers operating at full capacity 7×24 hours. After all, the military’s seven supercomputers only provide computing resources in their spare time. It is impossible to pay for electricity bills, labor and various consumption Give it to others for nothing.
Commonly known as the sound of a cannon, ten thousand taels of gold, in fact the burning efficiency of a cannon is not as efficient as the introduction fee of a supercomputer. They count by the second, which vividly interprets "time is money".
"99%, I have a lot of redundancy, if not enough, I can continue to expand."
Since the moment it was accidentally activated in the asteroid belt, Cybertrom has been trying its best to expand its honeycomb system. Each honeycomb structure is equivalent to the most advanced supercomputer in Earth civilization, but most of the time, these computing resources are in the dormant state.
Compared with "Adam" who was happy to get a small piece of "Fenrir" alloy, Cybertrom is obviously much happier. It has a complete satellite, and the content of Split metal and coin gold in it far exceeds "Fenrir", also because of the ownerless dragon soul, Cybertrom has the innate ability to devour metal and construct evolution of the gold dragon family.
Compared with the ongoing digital evolution of the golden dragon family, if Cybertrom evolves into a giant dragon, it will be a pure and complete real digital dragon.
"Of course! I want it all!"
Marcia cheered, her voice echoing throughout the room.
"Analyze the runes, analyze the magic array, deduce the 'halo', all belong to you!"
The seemingly innocent Cybertrom sent himself to the tiger's mouth for nothing, and became the other party's bodyguard. All the hard work, tiring work, and dirty work fell on him.
-
-(to be continued~^~)
You'll Also Like
-
I was assassinated by the reborn at the beginning, and I became a god on the spot
Chapter 483 4 hours ago -
The End of the World: I Have a House of Beautiful Tenants
Chapter 253 4 hours ago -
Naruto: I am invincible after simplifying the basic training
Chapter 152 4 hours ago -
After being favored by the vampire school beauty, I was numb
Chapter 704 4 hours ago -
After rebirth, the young lady chased me and begged for forgiveness
Chapter 188 4 hours ago -
What’s the matter? Can’t a love rival become your wife?
Chapter 323 1 days ago -
Yu-Gi-Oh, but I'm the only one playing with the Pendulum?
Chapter 48 1 days ago -
Villain: The Forbidden Zone Emperor's Son! Sleeping for Ten Thousand Years to Break the Divine
Chapter 60 1 days ago -
Honkai Impact 3: Yulandel's Beloved Brother
Chapter 224 1 days ago -
Naruto: I am in Uchiha, I can extract entries
Chapter 151 1 days ago